In his post colonial novel, In the Skin of a lion, the Canadian/Sri Lankan writer,
Michael Ondaatje is so interested in the term "Post colonialism" because he wants to show
that the term doesn't only refer to a period of time that comes after colonialism. In other
words, post colonialism is not only referred to as a literal description of formerly colonial
societies. He deals with the termas a literary genre and an academic construct that describes
the global conditions of a man after a period of colonialism. He shows that post colonialism is
a theory that tries to examine and explore the different styles and faces of European authority
to control the colonized. Ondaatje's attempt through such term is to unmask European
authority and to focus on those who are excluded such as the immigrants and the outsiders
who feel lost and without identities in their world. Thus, he writes In the Skin of a Lion to
retell and illuminate the story of the marginalized characters of Toronto who are used and
controlled by the colonizers to build Toronto but they remained as outsiders. The writer tries
to weave the story around such characters as Caravaggio the thief, Nicholas Temelcoff the
daredevil, Patrick the tunnel worker, and Alice the nun to show how the colonial powers
dominated over them, marginalized and alienated them in a city where they sought home. He
shows how the barriers of language, culture and beliefs hold these individuals back and
imprison them in "the tunnels and the stockyards". They were denied even the right to
communicate in their own language. This is because of the " rule of the city", a city that
imposes on them their philosophies and values on struggling. It made them known only by
their trade, "A starrer of roads, a house builder, a painter, a thief". Ondaatje resorts to The
Epic of Gilgamesh to suggest thematically the title of his novel as In the Skin of a Lion. He
emphasizes the idea of assuming the skin of a lion to take action because each one has
responsibility in life. To sum up, the novel is a call to provide the opportunity for the once
marginalized persons to stand and to be heard. In other words, the novel is about the
transformation of identities in the shed of the colonialism.
The research included preparation of new Schiff base (L) by two steps: preparation of precursor [bis(2-formyl-6-methoxyphenyl) succinate] (P) by reacting (3-methoxy salicyl aldehyde) with (succinoyl dichloride) as first step then react the prepared precursor (P) with (ethanethioamide) to have the new Schiff base [bis(2-((ethane thioyl imino) methyl)-6-methoxy phenyl) succinate] (L) as second step. Characterized compounds based on Mass spectra, 1 H, 13CNMR (for ligand (L)), FT-IR and UV spectrum, melting point, molar conduct, %C, %H, and %N, the percentage of the metal in complexes %M, magnetic susceptibility, while study corrosion inhibition (mild steel) in acid solution by weight loss. These measurements proved that by (Oxygen, Nitrogen, a
... Show MoreKarbala province regarded one part significant zones in Iraq and considered an economic resource of vegetation such as trees of fruits, sieve and other vegetation. This research aimed to utilize Normalized Difference Vegetation index (NDVI) and Subtracted (NDVI) for investigating the current vegetation cover at last four decay. The Normalized Difference Vegetation Index (NDVI) is the most extensively used satellite index of vegetation health and density. The primary goals of this research are gather a gathering of studied area (Karbala province) satellite images in sequence time for a similar region, these image captured by Landsat (TM 1985, TM 1995, ETM+ 2005 and Landsat 8 OLI (Operational Land Imager) 2015. Preprocessing such gap filli
... Show MoreAbstract:
Objective: To self-evaluate the effect of SBAR (Situation, Background, Assessment, and Recommendation) educational program on nurse and midwives practices in maternal health report documentation accuracy.
Methods: A quasi- experimental design was carried with the application of pre- post test for nurses and midwives’ knowledge and practices regarding SBAR communication tool. The study was held in Al-Elwia maternity teaching hospital, Al –Karckh maternity hospital and Al-Yarmouk teaching Hospital. purposive sample as it was convenient with inclusion criteria consisted of (84) nurse and midwives. The questionnaire comprised of demographic data, nurses- midwives practices of SBAR using (5) level Likert scale for assessme
Industrial development has recently increased, including that of plastic industries. Since plastic has a very long analytical life, it will cause environmental pollution, so studies have resorted to reusing recycled waste plastic (sustainable plastic) to produce environmentally friendly concrete (green concrete). In this research, producing environmentally friendly load-bearing concrete masonry units (blocks) was considered where five concrete mixtures were compressed at the blocks producing machine. The cement content reduced from 400 kg/m3 (B-400) to 300 kg/m3 (B-300) then to 200 kg/m3 (B-200). While (B-380) was produced using 380 kg/m3 cement and 20 kg/m3 nano-sil
... Show MoreIn this study, several ionanofluids (INFs) were prepared in order to study their efficiency as a cooling medium at 25 °C. The two-step technique is used to prepare ionanofluid (INF) by dispersing multi-walled carbon nanotubes (MWCNTs) in two concentrations 0.5 and 1 wt% in ionic liquid (IL). Two types of ionic liquids (ILs) were used: hydrophilic represented by 1-ethyl-3-methylimidazolium tetrafluoroborate [EMIM][BF4] and hydrophobic represented by 1-hexyl-3-methylimidazolium hexafluorophosphate [HMIM][PF6]. The thermophysical properties of the prepared INFs including thermal conductivity (TC), density and viscosity were measured experimental
Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreIn this study, manganese dioxide (MnO₂) nanoparticles (NPs) were synthesized via the hydrothermal method and utilized for the adsorption of Janus green dye (JG) from aqueous solutions. The effects of MnO₂ NPs on kinetics and diffusion were also analyzed. The synthesized NPs were characterized by scanning electron microscopy (SEM), X-ray diffraction (XRD), energy-dispersive X-ray analysis (EDX), and Fourier-transform infrared spectroscopy (FT-IR), with XRD confirming the nanoparticle size of 6.23 nm. The adsorption kinetics were investigated using three models: pseudo-first-order (PFO), pseudo-second-order (PSO), and the intraparticle diffusion model. The PSO model provided the best fit (R² = 0.999), indicating that the adsorpti
... Show MoreWhile conservative access preparations could increase fracture resistance of endodontically treated teeth, it may influence the shape of the prepared root canal. The aim of this study was to compare the prepared canal transportation and centering ability after continuous rotation or reciprocation instrumentation in teeth accessed through traditional or conservative endodontic cavities by using cone-beam computed tomography (CBCT).
Forty extracted intact, matured, and 2-rooted human maxillary first premolars were selected for this